Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Nordcloud
such as C#, Python, Perl, Java, C++ CICD tools such as Azure DevOps, GitHub Actions, Gitlab, Jenkins, TeamCity Scripting languages such as PowerShell, bash Observability/Monitoring: Prometheus, Grafana, Splunk Must have experience with either Kubernetes or OpenShift Hosting technologies such as IIS, nginx, Apache, App Service, LightSail Analytical and creative approach to problem solving We encourage you to apply More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
fortice
Engineer to join them on a major government project that's based in in Wokingham. Role Description: - SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. - Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. - Incident Response - Work with security teams to analyze and mitigate security incidents. - Custom Rule Creation - Develop More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
Location: Wokingham, Hybrid 2 days onsite Rate: Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. Incident Response - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
p/d Via Umbrella inside IR35 Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. Incident Response - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis
p/d Via Umbrella inside IR35 Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. Incident Response - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop More ❯
Wokingham, Berkshire, South East, United Kingdom Hybrid / WFH Options
Experis
p/d Via Umbrella inside IR35 Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. Incident Response - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
p/d Via Umbrella inside IR35 Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investi... More ❯
Hybrid - 3 days onsite per week Clearance: Active SC Clearance is essential Rate: £550 per day - PAYE via Umbrella Only Key Responsibilities: SIEM Engineering and Architecture skills, specifically in Splunk SaaS. End to end experience of the delivery lifecycle experience for improvements. Splunk SaaS experience and expertise as a lead architect and/or engineer Experience of defining improvements within More ❯
global consultancy that require an SC Cleared SIEM Architect to join them on a major government project that's based in Wokingham. - SIEM Engineering and Architecture skills, specifically in Splunk SaaS. - End to end experience of the delivery life cycle experience for improvements. - Splunk SaaS experience and expertise as a lead architect and/or engineer - Experience of defining improvements More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Whitehall Resources Ltd
Wokingham and the remainder remote working, for an initial 1-2 month contract. *Client requires Active SC Clearance* *Inside IR35* Job Description: - SIEM Engineering and Architecture skills, specifically in Splunk SaaS. - End to end experience of the delivery life cycle experience for improvements. - Splunk SaaS experience and expertise as a lead architect and/or engineer - Experience of defining improvements More ❯
L3 SOC Analyst A Global Organisation requires a Contract L3 SOC Analyst to join their Incident Response team acting as an escalaton point - Splunk & Defender Day Rate: £475 - £500pd IR35 Status: Inside Duration: 6 months initially Travel: 2 days a week in Berkshire This L3 SOC Analyst will have the previous following experience: Act as a lead investigator for high … containment strategies. Perform deep forensic analysis across endpoints, logs, and network traffic to uncover advanced threats. Develop and fine-tune detection rules and correlation logic in SIEM platforms (e.g., Splunk). Collaborate with engineering and threat intelligence teams to improve detection coverage and SOC workflows. Mentor and guide L1/L2 analysts, providing training, quality reviews, and escalation support. Design More ❯
SOC Analyst A Global Organisation requires a Contract L2 SOC Analyst to join their Incident Response team - Splunk, Defender Day Rate: £400 - £420pd IR35 Status: Inside Duration: 6 months initially Travel: 2 days a week in Berkshire This L2 SOC Analyst will have the previous following experience: Monitor and investigate security alerts using tools such as Splunk, Microsoft Defender, and More ❯
Manager will have the following previous experience: Direct end-to-end cyber incident lifecycle management for major security events -ensuring rapid coordination across business units and leveraging tools like Splunk and Defender to contain and mitigate threats Design, maintain, and continuously enhance playbooks, response frameworks, and tabletop exercises, incorporating threat intelligence and detection insights from CrowdStrike and Splunk to mature … IR readiness. Lead root cause analysis and develop actionable remediation plans; deliver executive-level reporting and trend analysis using integrated dashboards, combining insights from Splunk and Defender data sources. Serve as the primary advisor to senior leaders and cross-functional teams, guiding cyber incident communications, impact assessment, and risk mitigation strategies across the company, Operating Companies, and Joint Ventures. More ❯